Reading view

There are new articles available, click to refresh the page.

Signed but not secure

Signed but not secure

At the start of the year a very interesting (and some would say inevitable) event happened involving internet routing security, the first case study of a large-scale victim o

One of these JPEGs is not like the other

One of these JPEGs is not like the other

“JPEG” or the image encoding specification by the “Joint Photographic Experts Group” (JPEG) is a truly universal format at this stage. You really cannot go very far on the internet without seeing a JPEG file

From VNC to reverse shell

From VNC to reverse shell

Personal websites are weird. We are mostly past the era of having them, as things like twitter and hosted blog services like Medium have taken them over, but I’m a hold out. I run both my own blog, and have a landing page

The death of a TLD

The death of a TLD

Another one bites the dust. The gTLD gold rush is now seeing a steady flow of TLD’s that clearly just didnt work out.

In the last week, ICANN removed the documentation

The ISPs sharing your DNS query data

The ISPs sharing your DNS query data

DNS is fundamental to how the web works, and for most of the population it’s completely transparent. Everything on the web is accessed by a DNS name.

Since DNS is an old protocol ([November 1987 in fact](http

Payments with less of the evil

Payments with less of the evil

I hate card networks.

Visa and MasterCard are a pair of companies that I feel definitely make the world a worse place to live in, due to the fact that they sit in front of a critical part of how modern society wo

Making art with SSH key randomart

Making art with SSH key randomart

SSH is everywhere in the development or operations world now. For development it’s what allows you to push to GitHub. For operations it’s what allows you to reasonably securely log into Linux servers.

SSH

Encoding data in dubstep drops

Encoding data in dubstep drops

[Warning: Those who can’t stand EDM/dubstep, oh boy do I have bad news for you in regards to this blog post]

Dubstep songs are often criticized as sounding extremely computer generated and often just too aggressi

Email delivery is stuck on IPv4

Email delivery is stuck on IPv4

Generally speaking there is nothing that people want to talk about less than email delivery and for good reason, Email is continuously seen as one of those archaic protocols that everyone wants to improve but unfortu

IPv6 anycast possibly done better

IPv6 anycast possibly done better

Anycasting IP space has become quite a meme in the networking world in the last few years, with it being used sparsely in the past for UDP based services like DNS. Now it’s being used for TCP based services too,

Monitoring SNMP less devices with ease

Monitoring SNMP less devices with ease

In the consumer world you will likely encounter networking devices that don’t have a easy way to poll for their network stats, or in some cases you hate <abbr style=“border-bottom: 1px dotted green;” title=“S

YAMware Old Malware can still be fun!

YAMware Old Malware can still be fun!

(Side note, this blog post was written and then forgotten about quite a while ago, So I’ve finished it off, it was halfway done.)

While on holiday in the evenings with downtime to spare, I had realised that

Detecting anycast addresses and more

Detecting anycast addresses and more

Anycast networks are a pretty interesting way to fix quite a few issues with networked services that involve needing global spread. One of the interesting things is that a computer cannot really tell (unless it

A peek into the USM format

A peek into the USM format

A game that I really liked the visuals off, Crysis 3 uses a video file format called USM, This is a rather odd to me, since when I am used to pulling games apart for their assets, I am used to BINK video being used for th

Reverse Proxy + Cache for Minecraft

Reverse Proxy + Cache for Minecraft

One of the things that I like to play from time to time is Minecraft, however one of things ( at least with me this is ) is that Minecraft is best played with other people, This however means you have to go throu

MITM'ing TLS/SSL for debugging purposes

MITM’ing TLS/SSL for debugging purposes

From time to time you may want to debug TLS, Now this is not as easy as you might think, Because of the nature of TLS, you don’t really want to have anyone (even if they technically may have the key on the se

❌